Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Sign In] Quick and Dirty OAuth 2.0 Sign In with 1 RP - "OAuth 2.0 code flow abuse" #13

Open
timcappalli opened this issue Sep 27, 2021 · 0 comments

Comments

@timcappalli
Copy link
Member

Web application RP1 offers sign in/sign up functionality for users of identity provider IDP1, abusing OAuth2 (eg conducting an OAuth2 authorization code flow, attempting an API call with the resulting access token and considering the user signed in eg creating a session cookie if the call succeeds).

Ignoring how IDP1 authenticates the user, apart from the fact that successful auth results in a cookie in IDP1 domain.

Notable: the user agent doesn't see any user info, all exchanges occur server side.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant